首页 > 最新文献

The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.最新文献

英文 中文
Kernel-level intrusion detection method using simplification and grouping 采用简化和分组的核级入侵检测方法
Bo-heung Chung, Seungho Ryu, Jeong-Nyeo Kim, Jongsoo Jang
This paper proposes the kernel-level intrusion detection method (KIDM) using simplification and grouping of intrusion detection rules. These rules group into group-rule and common-rule generated by simplification. The intrusion detection is separated into common detection and extended detection step. The packet is checked by common detection using the common-rule. If this step detects nothing, the packet is forwarded to its destination. If not, it is passed into the extended detection using the group-rule. Through grouping of similar detection rules, the search space and searching time can be greatly minimized. Using the simplified rule in intrusion detection, the packet inspection time can be largely reduced. With the help of these two steps, fast and effective intrusion detection is possible in network nodes such as router and switch
通过对入侵检测规则的简化和分组,提出了一种核级入侵检测方法(KIDM)。这些规则分为组规则和通过简化生成的公共规则。将入侵检测分为普通检测步骤和扩展检测步骤。使用公共规则对报文进行公共检测。如果此步骤没有检测到任何内容,则将数据包转发到目的地。如果没有,则使用组规则将其传递到扩展检测中。通过对相似检测规则进行分组,可以极大地减少搜索空间和搜索时间。将简化后的规则应用到入侵检测中,可以大大减少检测报文的时间。通过这两个步骤,可以对路由器、交换机等网络节点进行快速有效的入侵检测
{"title":"Kernel-level intrusion detection method using simplification and grouping","authors":"Bo-heung Chung, Seungho Ryu, Jeong-Nyeo Kim, Jongsoo Jang","doi":"10.1109/ICACT.2005.245838","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245838","url":null,"abstract":"This paper proposes the kernel-level intrusion detection method (KIDM) using simplification and grouping of intrusion detection rules. These rules group into group-rule and common-rule generated by simplification. The intrusion detection is separated into common detection and extended detection step. The packet is checked by common detection using the common-rule. If this step detects nothing, the packet is forwarded to its destination. If not, it is passed into the extended detection using the group-rule. Through grouping of similar detection rules, the search space and searching time can be greatly minimized. Using the simplified rule in intrusion detection, the packet inspection time can be largely reduced. With the help of these two steps, fast and effective intrusion detection is possible in network nodes such as router and switch","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133304393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Steganalysis of facsimile 传真的隐写分析
Yunbiao Guo, Xingang You, Chuntian Zhang, Lan Hu, Linna Zhou
Communications associated with illicit activity has become a new focus of advanced communication technology. A steganographic method of binary image, which embeds data in facsimile by modifying the runlength of black pixel can build a covert communication over fax. This letter presents a steganalytic scheme to detect the message embedded in facsimile using run-length modification method. The detection is based on estimation of the original run-length distribution from the stego-facsimile, which is done by filtering stego-facsimile with corresponding filter. Experimental result indicates that relative modifications as small as 10% of usable run-length can be reliably detected
与非法活动有关的通信已成为先进通信技术的新焦点。一种二值图像隐写方法,通过修改黑像素的行距将数据嵌入传真中,实现传真上的秘密通信。本文提出了一种利用码长修改法检测传真中嵌入信息的隐写分析方案。该检测方法基于对隐写传真原始码长分布的估计,利用相应的滤波器对隐写传真进行滤波。实验结果表明,相对偏差仅占可用行程长度的10%就能被可靠地检测出来
{"title":"Steganalysis of facsimile","authors":"Yunbiao Guo, Xingang You, Chuntian Zhang, Lan Hu, Linna Zhou","doi":"10.1109/ICACT.2005.246009","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246009","url":null,"abstract":"Communications associated with illicit activity has become a new focus of advanced communication technology. A steganographic method of binary image, which embeds data in facsimile by modifying the runlength of black pixel can build a covert communication over fax. This letter presents a steganalytic scheme to detect the message embedded in facsimile using run-length modification method. The detection is based on estimation of the original run-length distribution from the stego-facsimile, which is done by filtering stego-facsimile with corresponding filter. Experimental result indicates that relative modifications as small as 10% of usable run-length can be reliably detected","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of light-weight IKE protocol for IPsec VPN within router 路由器内IPsec VPN轻量级IKE协议的实现
Jae-Deok Lim, Minho Han, Jeong-Nyeo Kim
IPsec protocol has been widely deployed at remote business environment because of its properties, confidentiality and integrity for network traffic. Before using IPsec protocol, it is needed that negotiations of security associations and keys between two end points of IPsec tunnel. IKE protocol is used when negotiation is done automatically. This paper introduces the light-weight IKE protocol that can be applied to an embedded system such as router. We prove that this IKE protocol has been implemented based on RFC by working with the other commercial IKE protocol and show the negotiation performance of IKE protocol by using test tool
IPsec协议以其对网络流量的保密性和完整性等特点,在远程业务环境中得到了广泛的应用。在使用IPsec协议之前,IPsec隧道的两端需要进行安全关联和密钥的协商。自动协商时使用IKE协议。本文介绍了一种适用于嵌入式系统(如路由器)的轻量级IKE协议。通过与其他商用IKE协议的协作,证明了该IKE协议是基于RFC实现的,并通过测试工具展示了IKE协议的协商性能
{"title":"Implementation of light-weight IKE protocol for IPsec VPN within router","authors":"Jae-Deok Lim, Minho Han, Jeong-Nyeo Kim","doi":"10.1109/ICACT.2005.246011","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246011","url":null,"abstract":"IPsec protocol has been widely deployed at remote business environment because of its properties, confidentiality and integrity for network traffic. Before using IPsec protocol, it is needed that negotiations of security associations and keys between two end points of IPsec tunnel. IKE protocol is used when negotiation is done automatically. This paper introduces the light-weight IKE protocol that can be applied to an embedded system such as router. We prove that this IKE protocol has been implemented based on RFC by working with the other commercial IKE protocol and show the negotiation performance of IKE protocol by using test tool","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114323884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intrusion alert normalization method using AWK scripts and attack name database 采用AWK脚本和攻击名称数据库的入侵警报规范化方法
Dongyoung Kim, Hyochan Bang, Jungchan Na
The current several classes of intrusion alert have various formats and semantics. And it is transferred using a variety of protocols. The protocols that transfer intrusion alert are IDXP, SNMP trap, SYSLOG protocol, etc. These varieties of intrusion alert formats make it difficult to use that together. Intrusion alert normalization makes various intrusions alert to same structure data and same semantics. We need this normalization process to unify alerts from a variety of security equipments. This paper describes how to normalize alerts from several IDS and security equipments.
目前的几种入侵警报具有不同的格式和语义。它通过各种协议传输。传输入侵警报的协议有IDXP、SNMP trap、SYSLOG协议等。这些不同的入侵警报格式使其难以同时使用。入侵警报规范化使各种入侵对相同的结构数据和相同的语义发出警报。我们需要这个规范化过程来统一来自各种安全设备的警报。本文介绍了如何规范化来自多个入侵检测系统和安全设备的警报。
{"title":"Intrusion alert normalization method using AWK scripts and attack name database","authors":"Dongyoung Kim, Hyochan Bang, Jungchan Na","doi":"10.1109/ICACT.2005.245944","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245944","url":null,"abstract":"The current several classes of intrusion alert have various formats and semantics. And it is transferred using a variety of protocols. The protocols that transfer intrusion alert are IDXP, SNMP trap, SYSLOG protocol, etc. These varieties of intrusion alert formats make it difficult to use that together. Intrusion alert normalization makes various intrusions alert to same structure data and same semantics. We need this normalization process to unify alerts from a variety of security equipments. This paper describes how to normalize alerts from several IDS and security equipments.","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"6 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114104344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multiple maneuvering target data association based on genetic algorithms 基于遗传算法的多机动目标数据关联
Jianhua Wang, Weiting Liu, Min Wang, Bing Zhang, Jian Wang
This paper studies the problem of data association in multiple maneuvering targets locating and tracking. Genetic algorithm is used successfully in solving the complex optimization and the industrial engineering problem. Recently researching on genetic algorithm has attracted a lot of attention. This paper puts forward a way of using genetic algorithms to resolve the problem of multiple target data association. The simulation results show that the algorithm used in this paper is able to avoid the local extremum and the outcome is satisfactory.
研究了多机动目标定位与跟踪中的数据关联问题。遗传算法成功地应用于复杂优化和工业工程问题的求解。近年来,遗传算法的研究引起了人们的广泛关注。提出了一种利用遗传算法解决多目标数据关联问题的方法。仿真结果表明,本文所采用的算法能够避免局部极值,得到了满意的结果。
{"title":"Multiple maneuvering target data association based on genetic algorithms","authors":"Jianhua Wang, Weiting Liu, Min Wang, Bing Zhang, Jian Wang","doi":"10.1109/ICACT.2005.246130","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246130","url":null,"abstract":"This paper studies the problem of data association in multiple maneuvering targets locating and tracking. Genetic algorithm is used successfully in solving the complex optimization and the industrial engineering problem. Recently researching on genetic algorithm has attracted a lot of attention. This paper puts forward a way of using genetic algorithms to resolve the problem of multiple target data association. The simulation results show that the algorithm used in this paper is able to avoid the local extremum and the outcome is satisfactory.","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114465887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advanced multicast service scheduling mechanism with IGMP snooping in WDM-PON WDM-PON中基于IGMP snooping的组播业务调度机制
Namuk Kim, H. Yun, Jeong-Ju Yoo, Tae-Yeon Kim, Byeong-Whi Kim, Minho Kang
In this paper, we deal with the multicast service management to efficiently support the broadcasting TV and the near real time high quality VoD (video on demand) service though the data communication networks. This is an emerging issue of the next generation network. Until now, several network architectures have been proposed but most of these have been concentrated on increase of the basic network bandwidth or induced the higher system complexity. The hybrid WDM-PON guarantees both kinds of traffic the independent and stable service by introducing the shared broadcast wavelength for multicast group traffic service. The proposed dynamic multicast group scheduling (DMGS) based on hybrid WDM-PON efficiently supports the common Internet traffic as well as the large number of multicast groups by maximizing the service share-index of registered multicast groups which uses the broadcast wavelength in real time
为了有效地支持广播电视和近实时的高质量视频点播业务,本文对多播业务进行了管理。这是下一代网络的一个新兴问题。到目前为止,已经提出了几种网络架构,但大多数都集中在增加基本网络带宽或引起更高的系统复杂性。混合WDM-PON通过为组播组业务引入共享的广播波长,保证了两种业务的独立性和稳定性。提出的基于混合WDM-PON的动态组播组调度(DMGS),通过实时利用广播波长最大化注册组播组的业务共享指数,有效地支持Internet通用流量和大量组播组
{"title":"Advanced multicast service scheduling mechanism with IGMP snooping in WDM-PON","authors":"Namuk Kim, H. Yun, Jeong-Ju Yoo, Tae-Yeon Kim, Byeong-Whi Kim, Minho Kang","doi":"10.1109/ICACT.2005.245852","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245852","url":null,"abstract":"In this paper, we deal with the multicast service management to efficiently support the broadcasting TV and the near real time high quality VoD (video on demand) service though the data communication networks. This is an emerging issue of the next generation network. Until now, several network architectures have been proposed but most of these have been concentrated on increase of the basic network bandwidth or induced the higher system complexity. The hybrid WDM-PON guarantees both kinds of traffic the independent and stable service by introducing the shared broadcast wavelength for multicast group traffic service. The proposed dynamic multicast group scheduling (DMGS) based on hybrid WDM-PON efficiently supports the common Internet traffic as well as the large number of multicast groups by maximizing the service share-index of registered multicast groups which uses the broadcast wavelength in real time","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114848773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
AVCoS: the component-based video conference service overactive networks 视频会议业务:基于组件的视频会议业务
Yang-Hui Chang, T. Chung
Nowadays, a video conference service is a provider-dependent service, in which conferencing users must manually pre-install same conferencing software before a conferencing session startups. Furthermore, the conferencing users must comply with requirements of the un-adaptable service. In this paper, we propose an active video conference service (AVCoS) over Yuan active networks (YAN) [Yang-Hui Chang et al. (2002)]. Following YAN architecture, AVCoS consists of application, value-added and network generic layer components. The components are extendable, replaceable and deployable. Via service compositions of YAN, AVCoS allows a user can customize a template service describing profile, called "ASDI", which describes how to composite those components. Therefore, the user can adapt functionalities of the service by a homepage to meet current conference node environment and network environment Then, Active Service Deployment Protocol (ASDP) will deploy software components of AVCoS to active nodes and the users on the fly according to customized ASDI. Thus, AVCoS adapts itself to meet heterogeneous users
目前,视频会议业务是依赖于供应商的业务,会议用户在会议开始之前必须手动预装相同的会议软件。此外,会议用户还必须满足不适应业务的要求。在本文中,我们提出了一种基于元有源网络(YAN)的有源视频会议服务(AVCoS) [Chang Yang-Hui et al.(2002)]。avco采用YAN架构,由应用层、增值层和网络通用层组成。这些组件是可扩展、可替换和可部署的。通过YAN的服务组合,avco允许用户自定义描述概要文件的模板服务,称为“ASDI”,它描述了如何组合这些组件。因此,用户可以通过一个主页来调整服务的功能,以适应当前的会议节点环境和网络环境。然后,ASDP (Active service Deployment Protocol)将根据定制的ASDI,动态地将avco的软件组件部署到活动节点和用户。因此,AVCoS可以适应不同类型的用户
{"title":"AVCoS: the component-based video conference service overactive networks","authors":"Yang-Hui Chang, T. Chung","doi":"10.1109/ICACT.2005.246176","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246176","url":null,"abstract":"Nowadays, a video conference service is a provider-dependent service, in which conferencing users must manually pre-install same conferencing software before a conferencing session startups. Furthermore, the conferencing users must comply with requirements of the un-adaptable service. In this paper, we propose an active video conference service (AVCoS) over Yuan active networks (YAN) [Yang-Hui Chang et al. (2002)]. Following YAN architecture, AVCoS consists of application, value-added and network generic layer components. The components are extendable, replaceable and deployable. Via service compositions of YAN, AVCoS allows a user can customize a template service describing profile, called \"ASDI\", which describes how to composite those components. Therefore, the user can adapt functionalities of the service by a homepage to meet current conference node environment and network environment Then, Active Service Deployment Protocol (ASDP) will deploy software components of AVCoS to active nodes and the users on the fly according to customized ASDI. Thus, AVCoS adapts itself to meet heterogeneous users","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-radio aided topology construction for UWB-based WPAN Scatternet 基于uwb的WPAN散射网多无线电辅助拓扑构建
Canfeng Chen, Weilin Wu
Wireless personal area network (WPAN) has been deemed one promising networking technique since diverse applications will be applicable in an ad hoc fashion in WPANs such as Bluetooth. Ultra wide band (UWB) has also become one hot research field because of its capability of supporting high-rate short-distance communications, and UWB-based WPAN has been receiving more and more research efforts recently. Though various piconet and scatternet formation algorithms have been proposed for Bluetooth-based WPAN, there is no systematical analysis and scheme for the newly emerged UWB-based WPAN, such as IEEE 802.15.3a, which exhibits some distinctions in topology construction. This paper first compares the difference of topology formation rationale and scheme between Bluetooth and UWB-based WPAN, then points out the fundamental problem pertinent to the piconet inter-connection in UWB-based WPAN. The main contribution of our work is to propose a multi-radio aided topology initialization algorithm without modification to the 802.15.3a specification. With the goal that all the participating devices get connected, the topology construction algorithm mainly includes bridge function, device positioning, and deliberate interconnections. A simulation-based study has shown that, compared with standard piconet initialization process, the network connectivity can be greatly enhanced by the proposed algorithm
无线个人区域网络(WPAN)被认为是一种很有前途的网络技术,因为各种各样的应用将以一种特别的方式在WPAN中应用,如蓝牙。超宽带(UWB)也因其支持高速短距离通信的能力而成为一个研究热点,近年来基于UWB的WPAN得到了越来越多的研究。尽管针对基于蓝牙的WPAN提出了各种微网和散射网形成算法,但对于新出现的基于uwb的WPAN,如IEEE 802.15.3a,并没有系统的分析和方案,其拓扑结构存在一定的差异。本文首先比较了蓝牙和基于uwb的WPAN在拓扑构成原理和方案上的差异,然后指出了基于uwb的WPAN中微网互连的基本问题。我们工作的主要贡献是在不修改802.15.3a规范的情况下提出一种多无线电辅助拓扑初始化算法。拓扑构建算法以所有参与设备连接为目标,主要包括桥接功能、设备定位和故意互连。基于仿真的研究表明,与标准的微微网初始化过程相比,该算法可以大大增强网络的连通性
{"title":"Multi-radio aided topology construction for UWB-based WPAN Scatternet","authors":"Canfeng Chen, Weilin Wu","doi":"10.1109/ICACT.2005.246185","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246185","url":null,"abstract":"Wireless personal area network (WPAN) has been deemed one promising networking technique since diverse applications will be applicable in an ad hoc fashion in WPANs such as Bluetooth. Ultra wide band (UWB) has also become one hot research field because of its capability of supporting high-rate short-distance communications, and UWB-based WPAN has been receiving more and more research efforts recently. Though various piconet and scatternet formation algorithms have been proposed for Bluetooth-based WPAN, there is no systematical analysis and scheme for the newly emerged UWB-based WPAN, such as IEEE 802.15.3a, which exhibits some distinctions in topology construction. This paper first compares the difference of topology formation rationale and scheme between Bluetooth and UWB-based WPAN, then points out the fundamental problem pertinent to the piconet inter-connection in UWB-based WPAN. The main contribution of our work is to propose a multi-radio aided topology initialization algorithm without modification to the 802.15.3a specification. With the goal that all the participating devices get connected, the topology construction algorithm mainly includes bridge function, device positioning, and deliberate interconnections. A simulation-based study has shown that, compared with standard piconet initialization process, the network connectivity can be greatly enhanced by the proposed algorithm","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116538018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel method for noise cancellation of speech signals using wavelet packets 一种基于小波包的语音信号去噪方法
Ali Tinati, B. Mozaffary
In this paper a novel method for cancellation of broadband/narrowband noise from speech signals is proposed. Independent component analysis (ICA) and wavelet packet approaches have been combined for blind noise separation from mixtures of speech signals. ICA method is used to estimate matrix A, which defines how the mixture signals have been mixed. Wavelet packets are used for de-correlation of approximation of noise and speech. This algorithm is applied to real data with high SNRs and has been able to completely retrieve speech signal from white background noise successfully
本文提出了一种消除语音信号中宽带/窄带噪声的新方法。将独立分量分析(ICA)和小波包方法相结合,对混合语音信号进行盲噪声分离。采用ICA方法对矩阵A进行估计,矩阵A定义了混合信号的混合方式。小波包用于噪声和语音的去相关逼近。将该算法应用于高信噪比的实际数据中,成功地从白背景噪声中完全提取语音信号
{"title":"A novel method for noise cancellation of speech signals using wavelet packets","authors":"Ali Tinati, B. Mozaffary","doi":"10.1109/ICACT.2005.245999","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245999","url":null,"abstract":"In this paper a novel method for cancellation of broadband/narrowband noise from speech signals is proposed. Independent component analysis (ICA) and wavelet packet approaches have been combined for blind noise separation from mixtures of speech signals. ICA method is used to estimate matrix A, which defines how the mixture signals have been mixed. Wavelet packets are used for de-correlation of approximation of noise and speech. This algorithm is applied to real data with high SNRs and has been able to completely retrieve speech signal from white background noise successfully","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115296879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
High performance and low complexity Max-Log-MAP algorithm for FPGA turbo decoder FPGA turbo译码器的高性能低复杂度Max-Log-MAP算法
Mao-Hsiu Hsu, Jhin-Fang Huang
In this paper, we focus on implementing turbo decoder compliant with 3GPP spec, we adopted sliding window method with forward state metric as an accuracy initialization value and a modified Max-Log-MAP algorithm which modify extrinsic information by a scaling factor R. Then, we can implement the whole turbo decoder with a single-decoder structure, producing high data throughput with lower logic gates usage. The FPGA design of our proposed structure (SW-modified Max-Log-MAP) results in only 0.1 dB away from the optimal structure (SW-Log-MAP) at BER=10-4. It also saves about 29% hardware cost than the optimal structure
本文主要研究符合3GPP规范的turbo译码器,采用前向状态度量作为精度初始值的滑动窗口方法,采用改进的Max-Log-MAP算法,通过比例因子r来修改外部信息,从而实现了整个turbo译码器的单译码结构,在降低逻辑门使用率的同时实现了高数据吞吐量。我们提出的结构(sw修改的Max-Log-MAP)的FPGA设计在BER=10-4时与最佳结构(SW-Log-MAP)相差仅0.1 dB。与最优结构相比,可节省约29%的硬件成本
{"title":"High performance and low complexity Max-Log-MAP algorithm for FPGA turbo decoder","authors":"Mao-Hsiu Hsu, Jhin-Fang Huang","doi":"10.1109/ICACT.2005.246081","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246081","url":null,"abstract":"In this paper, we focus on implementing turbo decoder compliant with 3GPP spec, we adopted sliding window method with forward state metric as an accuracy initialization value and a modified Max-Log-MAP algorithm which modify extrinsic information by a scaling factor R. Then, we can implement the whole turbo decoder with a single-decoder structure, producing high data throughput with lower logic gates usage. The FPGA design of our proposed structure (SW-modified Max-Log-MAP) results in only 0.1 dB away from the optimal structure (SW-Log-MAP) at BER=10-4. It also saves about 29% hardware cost than the optimal structure","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123079195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1